background image

Self-Encrypting Drives for 

Servers, NAS and SAN Arrays

approach has an a fundamental flaw: Rather than 
increasing security, it actually decreases security 
and increases complexity by exposing encryption 
keys that are long-lived keys, while exposing large 
amounts of cipher text that were all encrypted 
with only a single encryption key. If encryption is 
needed for data in motion, it should be provided 
by IPSec or FC over IP. Encrypting data on the 
drive is best performed by the drive itself, for all of 
the reasons provided below.  

Application, database, OS and file system 
encryption (see Figure 1) are all techniques 
that cover threats to drive data (whether from 
database, file or system administrators or from 
hackers) that arise within the data center. But due 
to the significant performance degradation and 
non-scalable changes required to the application, 
database, OS or file system that such encryption 
entails, it’s impractical to encrypt more than just a 
limited portion of data. Administrators cope with 
this restriction by reserving encryption for only the 
most sensitive data.

This forces administrators to rely on data 
classification in order to identify and locate 
sensitive data; unfortunately, it’s widely 
acknowledged that this process fails to identify 
all instances of sensitive data. Data classification 
is difficult, labor-intensive and challenging to 
maintain, especially when sensitive information 
can be copied from a protected source to an 
unprotected destination. Such problems result 
in too much unencrypted sensitive data being 
written to disk, data which will likely persist on 
the hard drive long after the drive’s useful life has 
ended.

As such, it falls to encryption technologies 
downstream of the file system to provide full disk 
encryption and close the gap created when data 
classification fails to capture sensitive data. These 
technologies relieve data custodians from the 
responsibility of classifying the data’s sensitivity 
upon leaving control of the data center, a task 
fraught with management headaches and extra 
cost. Encrypting in the fabric, RAID disk controller 
(in a server or storage subsystem controller) or 
hard drive are all possibilities. But where should 
this encryption take place?

Using Self-Encrypting Drives merely for instant 
secure erase provides an extremely efficient and 
effective means to help securely retire a drive. 
But using SEDs in auto-lock mode provides even 
more advantages. In short, from the moment the 
drive or system is removed from the data center 
(with or without authorization), the drive is locked. 
No advance thought or action is required from 
the data center administrator to protect this data. 
This helps prevent a breach should the drive be 
mishandled and helps secure the data against the 
threat of insider or outside theft.

Comparing Technologies for Securing Data 
on Hard Drives

No single encryption technology can effectively 
and efficiently secure all data against all threats. 
Different technologies are used to protect against 
different threats. For example, Self-Encrypting 
Drives help secure data against threats when the 
drive eventually leaves the owner’s control, but 
it cannot protect data from certain threats that 
take place within the data center. For example, if 
an attacker gains access to a server that can in 
turn access an unlocked drive, the attacker can 
read the clear text coming from the drive. Thus 
it’s important to remember that SED encryption 
technology does not replace the data center’s 
access controls, rather it complements them.

Securing data at rest also should be 
complementary, rather than a replacement, to 
securing data in motion. The vast majority of data 
in motion moving over the wire downstream of 
the file system, whether moving over Ethernet 
on the NAS or at the block level on a SAN, is 
physically under the IT storage administrator’s 
control, and therefore is not considered a 
security risk. For the data in motion that is not 
physically under the administrator’s control, the 
most widely accepted and established practice 
for encrypting this data is to use IPSec or FC 
over IP, which use ephemeral session encryption 
keys to encrypt small amounts of data. It may 
seem that, instead of using this session security 
technique, encrypting in the fabric to secure the 
data on the hard drive is a better solution: the 
data is encrypted not only on the hard drive, 
but also as it travels through the fabric. But this 

4

Содержание 10K.3 - Savvio 300 GB Hard Drive

Страница 1: ... drives are retired and moved outside the physically protected data center into the hands of others the data on those drives is put at significant risk IT departments routinely retire drives for a variety of reasons including Returning drives for warranty repair or expired lease agreements Removal and disposal of drives Repurposing drives for other storage duties Nearly all drives eventually leave...

Страница 2: ...reconciling the services as well as internal reports and auditing More troubling transporting a drive to the service puts the drive s data at risk Just one lost drive could cost a company millions of dollars in remedies for the breached data With these shortcomings in mind it s no surprise that an IBM study found that 90 percent of the drives returned to IBM were still readable The key lesson here...

Страница 3: ...er the drive is powered down In other words the moment the SED is switched off or unplugged it automatically locks down the drive s data When the SED is then powered back on the SED requires authentication before being able to unlock its encryption key and read any data on the drive thus protecting against misplacement and insider or external theft The lifecycle of authentication keys can be manag...

Страница 4: ...ver or storage subsystem controller or hard drive are all possibilities But where should this encryption take place Using Self Encrypting Drives merely for instant secure erase provides an extremely efficient and effective means to help securely retire a drive But using SEDs in auto lock mode provides even more advantages In short from the moment the drive or system is removed from the data center...

Страница 5: ...the wire encryption to technologies designed for securing data in motion Several years ago before Seagate began working on drive encryption the United States National Security Agency NSA analyzed the problem of data security and determined that the best place to perform encryption is in the hard drive It s a well known security maxim that guards should be placed as close to the jewels as possible ...

Страница 6: ... SEDs as well and it won t be long until all hard drives will be Self Encrypting Drives Standardization of Self Encrypting Drives promises lower acquisition costs as well The world s top six hard drive vendors collaborated to develop the final enterprise specification published by the Trusted Computing Group TCG This specification created to be the standard for developing and managing Self Encrypt...

Страница 7: ...being written to the disk When a read is performed the encrypted data on the disk is decrypted before leaving the drive During normal operation an SED is completely transparent to the system appearing to be the same as a non encrypting drive The Self Encrypting Drive is constantly encrypting encryption cannot be accidentally turned off When the owner acquires the drive this embedded encryption key...

Страница 8: ...r operates on z OS i5 OS AIX Linux HP UX Sun Solaris and Windows operating systems and is designed to be a shared resource which can be deployed in several locations within an enterprise to help ensure the application is highly available With its platform neutrality and its ability to take advantage of the existing security policies and high availability environment in an organization s most secur...

Страница 9: ...authentication to become unlocked In an auto locking SED an encryption key and an authentication key work together to enable access to the data stored on the drive An auto locking SED which is configured to use authentication contains no secret that if discovered could reveal the encrypted data A simple description of the unlock process explains why this is true The unlock process is the part of t...

Страница 10: ...he authentication process is successfully completed the drive is unlocked until the next time it is powered down Note that this authentication process only occurs when the drive is first powered on it does not repeat with each read and write operation 3 Clear encryption key encrypts and decrypts the data The clear text encryption key is then used to encrypt data to be written to the disk and to de...

Страница 11: ... each approach thus care must be taken when choosing where to encrypt Data encryption options come in many forms including Host based software Encryption hardware appliances Encryption ASICs that reside on the adapter switch RAID controller or hard drive When evaluating how to protect and where to encrypt data at rest on the SAN NAS or the server s direct attached storage the best solution is to e...

Страница 12: ...s are incorporated into hard drives they can be intermixed with older drives in storage systems that support encryption without making any changes specific to the new drives higher level of protection Key management is also becoming interoperable IBM LSI and Seagate will support the Key Management Interoperability Protocol submitted to OASIS for advancement through their open standards process Gov...

Страница 13: ... vendors are already shipping SEDs today This promises an end to the risk of data breaches when hard drives leave their owner s control Performance at Full Drive Speed Less Need for Data Classification The Self Encrypting Drive has a dedicated engine for full interface speed encryption Utilizing hardware based encryption the SED s encryption engine resides in the controller ASIC Each drive port us...

Страница 14: ... required as long as the switches and routers support IPSec data encryption Fibre Channel technology can only reach a distance of about 10km but IT managers need to share protect and move data much farther than that sometimes across geographic borders QLogic provides routers and switches that enable SAN traffic to move over IP linking SANs over WANs As a result self encrypting storage is expected ...

Страница 15: ...should be provided by IPSec or FC over IP Encrypting data on the drive is best performed by the drive itself for all of the reasons provided by the above sections Additional Information Additional information about storage security can be found at the Trusted Computing Group www trustedcomputinggroup org and at the Storage Networking Industry Association SNIA Storage Security Industry Forum SSIF w...

Отзывы: